** DISPUTED ** ldd in the GNU C Library (aka glibc or libc6) 2.13 and earlier allows local users to gain privileges via a Trojan horse executable file linked with a modified loader that omits certain LD_TRACE_LOADED_OBJECTS checks. NOTE: the GNU C Library vendor states "This is just nonsense. There are a gazillion other ways to introduce code if people are downloading arbitrary binaries and install them in appropriate directories or set LD_LIBRARY_PATH etc."
http://openwall.com/lists/oss-security/2011/03/07/10
http://openwall.com/lists/oss-security/2011/03/07/13
http://openwall.com/lists/oss-security/2011/03/07/7
http://openwall.com/lists/oss-security/2011/03/08/1
http://openwall.com/lists/oss-security/2011/03/08/10
http://openwall.com/lists/oss-security/2011/03/08/2
http://openwall.com/lists/oss-security/2011/03/08/3
http://openwall.com/lists/oss-security/2011/03/08/7
http://reverse.lostrealm.com/protect/ldd.html
http://www.catonmat.net/blog/ldd-arbitrary-code-execution/
http://www.redhat.com/support/errata/RHSA-2011-1526.html
OR
cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:* versions up to 2.1.3 (inclusive)
ID | Name | Product | Family | Severity |
---|---|---|---|---|
89038 | VMware ESX / ESXi Third-Party Libraries Multiple Vulnerabilities (VMSA-2012-0013) (remote check) | Nessus | Misc. | high |
79283 | RHEL 5 : rhev-hypervisor5 (RHSA-2012:0168) | Nessus | Red Hat Local Security Checks | high |
70886 | ESXi 5.1 < Build 1063671 Multiple Vulnerabilities (remote check) | Nessus | Misc. | medium |
70885 | ESXi 5.0 < Build 912577 Multiple Vulnerabilities (remote check) | Nessus | Misc. | high |
68456 | Oracle Linux 5 : glibc (ELSA-2012-0126) | Nessus | Oracle Linux Local Security Checks | medium |
68455 | Oracle Linux 4 : glibc (ELSA-2012-0125) | Nessus | Oracle Linux Local Security Checks | high |
63332 | VMSA-2012-0018 : VMware security updates for vCSA and ESXi | Nessus | VMware ESX Local Security Checks | high |
61747 | VMSA-2012-0013 : VMware vSphere and vCOps updates to third-party libraries | Nessus | VMware ESX Local Security Checks | high |
61244 | Scientific Linux Security Update : glibc on SL5.x i386/x86_64 (20120213) | Nessus | Scientific Linux Local Security Checks | medium |
61243 | Scientific Linux Security Update : glibc on SL4.x i386/x86_64 (20120213) | Nessus | Scientific Linux Local Security Checks | high |
61187 | Scientific Linux Security Update : glibc on SL6.x i386/x86_64 | Nessus | Scientific Linux Local Security Checks | medium |
57929 | RHEL 5 : glibc (RHSA-2012:0126) | Nessus | Red Hat Local Security Checks | medium |
57928 | RHEL 4 : glibc (RHSA-2012:0125) | Nessus | Red Hat Local Security Checks | high |
57924 | CentOS 5 : glibc (CESA-2012:0126) | Nessus | CentOS Local Security Checks | medium |
57923 | CentOS 4 : glibc (CESA-2012:0125) | Nessus | CentOS Local Security Checks | high |
57011 | RHEL 6 : glibc (RHSA-2011:1526) | Nessus | Red Hat Local Security Checks | medium |